Articles with public access mandates - Ben Y. ZhaoLearn more
Available somewhere: 59
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
IEEE Symposium on Security and Privacy (Oakland), 513-529, 2019
Mandates: US National Science Foundation
Latent Backdoor Attacks on Deep Neural Networks
Y Yao, H Li, H Zheng, BY Zhao
Proceedings of ACM Conference on Computer and Communication Security (CCS), 2019
Mandates: US National Science Foundation
Unsupervised clickstream clustering for user behavior analysis
G Wang, X Zhang, S Tang, H Zheng, BY Zhao
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
Mandates: US National Science Foundation
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
Proceedings of USENIX Security Symposium, 2020
Mandates: US National Science Foundation, US Department of Defense
Automated crowdturfing attacks and defenses in online review systems
Y Yao, B Viswanath, J Cryan, H Zheng, BY Zhao
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Mandates: US National Science Foundation
Backdoor attacks against deep learning systems in the physical world
E Wenger, J Passananti, AN Bhagoji, Y Yao, H Zheng, BY Zhao
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
Mandates: US National Science Foundation, US Department of Defense
Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th annual international conference on mobile systems …, 2016
Mandates: US National Science Foundation
Glaze: Protecting artists from style mimicry by text-to-image models
S Shan, J Cryan, E Wenger, H Zheng, R Hanocka, BY Zhao
Proceedings of USENIX Security Symposium, arXiv preprint arXiv:2302.04222, 2023
Mandates: US National Science Foundation, US Department of Defense
Complexity vs. performance: empirical analysis of machine learning as a service
Y Yao, Z Xiao, B Wang, B Viswanath, H Zheng, BY Zhao
Proceedings of the 2017 Internet Measurement Conference, 384-397, 2017
Mandates: US National Science Foundation
Safely and automatically updating in-network ACL configurations with intent language
B Tian, X Zhang, E Zhai, HH Liu, Q Ye, C Wang, X Wu, Z Ji, Y Sang, ...
Proceedings of ACM SIGCOMM, 214-226, 2019
Mandates: US National Science Foundation, National Natural Science Foundation of China
Gotta catch ’em all: using honeypots to catch adversarial attacks on neural networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
Proceedings of ACM Conference on Computer and Communication Security (CCS), 2020
Mandates: US National Science Foundation, US Department of Defense
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao
Proc. of USENIX Security Symposium, arXiv preprint arXiv:2006.14042, 2022
Mandates: US National Science Foundation, US Department of Defense
Wearable microphone jamming
Y Chen, H Li, SY Teng, S Nagels, Z Li, P Lopes, BY Zhao, H Zheng
Proceedings of the 2020 chi conference on human factors in computing systems …, 2020
Mandates: US National Science Foundation
Anatomy of a personalized livestreaming system
B Wang, X Zhang, G Wang, H Zheng, BY Zhao
Proceedings of the 2016 Internet Measurement Conference, 485-498, 2016
Mandates: US National Science Foundation
Clickstream user behavior models
G Wang, X Zhang, S Tang, C Wilson, H Zheng, BY Zhao
ACM Transactions on the Web (TWEB) 11 (4), 1-37, 2017
Mandates: US National Science Foundation
Gender bias in the job market: A longitudinal analysis
S Tang, X Zhang, J Cryan, MJ Metzger, H Zheng, BY Zhao
Proceedings of the ACM on Human-Computer Interaction 1 (CSCW), 1-19, 2017
Mandates: US National Science Foundation
Detecting gender stereotypes: Lexicon vs. supervised learning methods
J Cryan, S Tang, X Zhang, M Metzger, H Zheng, BY Zhao
Proceedings of the 2020 CHI conference on human factors in computing systems …, 2020
Mandates: US National Science Foundation
Ghost riders: Sybil attacks on crowdsourced mobile mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
IEEE/ACM transactions on networking 26 (3), 1123-1136, 2018
Mandates: US National Science Foundation
Patch-based defenses against web fingerprinting attacks
S Shan, AN Bhagoji, H Zheng, BY Zhao
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
Mandates: US National Science Foundation, US Department of Defense
Deep graph convolutional networks for incident-driven traffic speed prediction
Q Xie, T Guo, Y Chen, Y Xiao, X Wang, BY Zhao
Proceedings of the 29th ACM international conference on information …, 2020
Mandates: National Natural Science Foundation of China, Academy of Finland
Publication and funding information is determined automatically by a computer program